Learning Cyber Security Through Gamification
|
|
- Hector O’Connor’
- 5 years ago
- Views:
Transcription
1 ISSN (Print) : ISSN (Online) : Indian Journal of Science and Technology, Vol 8(7), , April 2015 DOI: /ijst/2015/v8i7/67760 Learning Cyber Security Through Gamification K. Boopathi 1 *, S. Sreejith 1 and A. Bithin 2 1 Department of Computer Science and Application. Amrita Vishwa Vidyapeetham University, Amritapuri, India; boopathi@boopathi.me, sreejiths.sasikumar@gmail.com 2 Department of Cyber Security, Amrita Vishwa Vidyapeetham University, Amritapuri, India; bithin2007@gmail.com Abstract Objectives: Introducing gaming approach in the jeopardy round of InCTF (Indian Capture the Flag). Methods: Present Jeopardy round of InCTF can be compared as take-away assignments, where participants are given set of questions to solve, this is aimed at testing their knowledge in various computer security concepts. To make jeopardy round more attractive and motivating to the students we introduce a gaming approach to it. A game is developed which is divided into various levels and at each level the knowledge of students in Cyber security concepts is tested. Our design will help others to host jeopardy round CTF and get maximum learning outcome from the students. Findings: Security competition like CTF (Capture the Flag) are effective tool in providing computer security training. Conclusion: Gaming approach in Cyber security education will be a big step forward in training more students in computer security and create a secure online world. Keywords: CTF, Cyber Security, Education, Gamification, Jeopardy 1. Introduction Based on the defacement statistics of Computer Emergency Report Team (CERT) from Jan 2014 to Oct , large number of in domains has been compromised. The figure 1 gives an overview of statistics on the number of domains that have been compromised during this period. This alarming rate of incidences has made us to think whether our software developers are well equipped with knowledge on various computer security concepts. The lack of security experts in India is also a reason behind this increasing number of computer security breaches in our country. This can be avoided by revising Indian curriculum2 at graduate and undergraduate levels. Based on the National Cyber security policy, there is a need of security professionals in the next 5 years 3. This need can only be satisfied if there is an efficient training methodology like CTF 4 security competition where the learning is happening in a competitive environment. Figure 1. CERT-In Defacement Statistics (From Jan Oct 2014). *Author for correspondence
2 K. Boopathi, S. Sreejith and A. Bithin InCTF 5 is one such CTF 4 contest conducted in India. But InCTF 5 is different from other CTF 4 contest as it contains three rounds. They are3 learning round, jeopardy round and interactive round. 1.1 Learning Round This round mainly focuses on introducing some important concepts of Cyber security. Tutorials related to various concepts like Binary exploitation, Reverse engineering, Forensics, Web application security and application security are uploaded and the participants need to use that tutorial to understand these concepts. No evaluation is involved in this round because its only aim is to introduce various Cyber security concepts to the participants. Concepts learned from this round are tested in next round. 1.2 Jeopardy Round Jeopardy round is testing the knowledge of the participants based on the computer security concepts introduced in the learning round by giving a set of questions to solve. This method lacks the interaction as this is similar to writing assignments. So in order to make this round more attractive and motivate students, we are introducing a gaming approach. Here Cyber security concepts will be introduced through a game which is divided into various levels. Each level introduces various concepts related to Cyber security. The game is divided into four levels with each level testing the knowledge of participants in various concepts of Cyber security. Each level is divided into five parts and new levels will be unlocked once they complete any three parts from each level. First level tests the basic programming skills of participants by giving some basic programming puzzles. In the second level, participants will be tested in web application security concepts like SQL injection attack, Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF) and file upload vulnerabilities. In the third level, participants will be tested in application security concepts like binary exploitation, buffer overflow, heap overflow and format string attacks. In level 4, participants will be tested in reverse engineering and forensics concepts like file system forensics, memory forensics, Android forensics, network forensics, botnet detection and root kit. This approach will bring back the much needed excitement and motivation needed for the participants. 1.3 Interactive Round The main aim of this round is to apply the concepts of Cyber security in real word scenario. For that a virtual image is created by deliberately including some vulnerable applications and each team will be given a Virtual Box image or OVF file. Each team is getting the same copy of virtual image as other teams. Each team need to understand the vulnerability in the applications and using that they need to attack other teams and also defend their own system from security attacks of other teams. First a unique flag will be placed in each team s machine and it is done by the game server. Game server is an important component in this round. Planting flags on each team s machine, monitoring the services running on each team s machine and awarding points to teams are some of the main functions of game server. If a team successfully managed to attack other team, flag will be captured and submitted to the game server. After analyzing the flag, game server will award points to the teams in the form of attack and defense points. Attack points are the points that are given to a team if they successfully managed to attack other team by exploiting the vulnerabilities in the application and the defence points are given if they successfully managed to defend their system from the attacks of other teams. Each team s ranks will be shown in the scoreboard with attack and defence points. In the remaining part of the paper, Section 2 explains the related work which gives an overview of some of the competitions similar to InCTF 5. Section 3 gives an overview of the game architecture and explains how it can be introduced to make the current jeopardy round more attractive and fun to the participants. Section 4 explains technical details involved in the design of registration portal, game flow diagram and CTF challenge or problem classification. Section 5 gives detailed explanation about various learning outcome for the students after participants in the contest. Section 6 gives conclusion. 2. Related Works There are various security competitions conducted worldwide. InCTF 5 contest is one such event conducted in India. The main goal of this event is to teach Cyber security concepts effectively. Indian Journal of Science and Technology 643
3 Learning Cyber Security Through Gamification 2.1 ictf (International CTF) This contest is organized by the department of computer science University of California, Santa Barbara every year 6. Their main goal is to enhance the security knowledge of the participants in effective manner. They usually conduct attack-defense style CTF where each team need to attack other teams by exploiting the vulnerability and defend from other attacks. The ictf framework explains the requirements in conducting CTF and how to configure ictf framework to conduct our own CTF contests. 2.2 picoctf Another hacking competition conducted at United States aimed at teaching security concepts to the high school students7. They will make use of gaming approach to teach security concepts to the students. This method can be adopted in InCTF 5 and modified based on how effectively we can educate our Indian college students with gaming approach. 2.3 rwthctf Popular hacking competition organized by the RWTH Aachen University every year8. Another CTF competition aimed at teaching the security concepts to the end users. Because of its poor documentation, the setup of rwthctf is little known to the users. These CTFs are international CTFs and high standard, these kind of competitions are hard for Indian students to compete, so we came up with a solution to ease Cyber security education in InCTF 5 so that Indian students can learn the security concepts without any fear of participating in it. 3. Architecture Gamification is a good approaching in educating students, CTF competitions are trying to adopt this to make its outcome very effective. InCTF5 is trying to use this methodology to teach Cyber security in coming years. Because gaming is always best when it comes to entertainment and excitement9. Figure 2 explains an architecture that shows how the gaming interface can be developed with the help of various technologies. Figure 2. InCTF architecture diagram. 3.1 Central Database This database is implemented in mongo DB, which is a NoSQL database. We have chosen in order to increase the speed of the website. The main functions of central database is to store the details of the team members, problems, game status and the scoreboard status. 3.2 Memcached This is a distributed memory caching technology which is used to reduce the number of request send to the central database. Large number of teams will be accessing the gaming environment at the same time. So thousands of request will be send to the central database and there is a chance that the system might crash. To overcome this problem we will be making use of this memcached technology. Using memcached all the unsolved problems from the central database is cached and loaded from memcached instead of loading it from central database. Only the status of the solved problem is kept in the central database. So next time when a team tries to access any unsolved problem, that will be loaded from memcached rather than going to the central database. 644 Indian Journal of Science and Technology
4 K. Boopathi, S. Sreejith and A. Bithin Only the important requests like updating problem status and scoreboard status will be send to the central database. 3.3 Flask Application It is a popular python micro framework, used to develop lightweight web application because it keeps the core simple and supports extension. Flask uses Werkzeug WSGI (Web Server Gateway Interface) and Jinja2 template engine. Jinja2 template engine adds sandboxed execution for security reason. 4. Contest Design 4.1 Registration Participants from Indian universities are only allowed to register, once the participants completes their individual registration, confirmation will be send to them. They need to confirm their account by clicking the link sent to them by . On activating the participant s account, they can form the team with same college members. Minimum of 3 and maximum of 5 members are allowed per team with a coach. 4.2 Publicity We do publicity through various social Medias like Facebook, Twitter, WhatsApp, blogs. Sending posters to colleges, Contacting universities and teachers, Mailing list and Local newspapers in all major cities and area where there is lot of colleges. 4.3 Game Design The game is divided into 4 levels with each level testing knowledge of the student about various concepts of Cyber security. The difficulty level increases as the level increases. Teams need to solve 3 parts in each level to unlock new levels. In first level, a boy found a hidden box from his house. He will open that box by solving a set of challenges. After opening that box a robot comes out of that box and become friend with that boy and agrees to help him to solve the remaining challenges as the game progresses. This level test the basic programming skills of participants by giving various programming puzzles. This is the scenario in level 1. In level 2, boy and robot reach a place that is not familiar to them and suddenly they lost a way back to their home. They found a map from that place by solving some challenges and discover the way back to their home. This level test various concepts related to web application security. This is the scenario in level 2. In level 3, boy gets an invitation for participating in a Hackathon competition. He needs to get eligibility pass by solving a set of challenges. This level tests various concepts related to application security. This is the scenario in level 3. In level 4, after getting the eligibility pass he will participate in Hackathon competition. There some set of challenges will be given and need to solve it to win the competition. This level tests various concepts related to Reverse engineering and Forensics. This is the storyline of the game. Figure 3 shows the execution flow of the game and the various concepts tested in each level. 4.4 Problem View There are two ways users can view the problem. One way is through game and another way is through normal text based view. In game, participants can view the problem by moving into the position by using arrow keys in keyboard through game and it is shown in the figure 4. Another method is through normal problem viewer window. In this method, participants can simply select the problems and it will be shown in a separate window. Problems will be shown in new window and simply submit answer for the problem. Figure 5 lists the solved and unsolved problems. 4. Discussion on Concepts Taught Various concepts taught during Jeopardy round through our gaming approach are discussed here. 5.1 Level 1 Part 1 - Puzzle to print a sequence of characters in some order. Part 2 - Puzzle to print the numbers without using any loops. Part 3-1-D and 2-D array puzzles. Part 4 - String operations puzzles. Part 5 - Puzzle related to printing Pascal s triangle. These are all the concepts tested in level 1. In level 2, concepts related to the web application security will be introduced. This level will test the knowledge of participants in web application security. Indian Journal of Science and Technology 645
5 Learning Cyber Security Through Gamification Figure 3. Game flow chart. 646 Indian Journal of Science and Technology
6 K. Boopathi, S. Sreejith and A. Bithin Figure 4. Game environment. 5.2 Level 2 Part 1 - SQL injection attacks Part 2 - Cross Site Scripting (XSS) Part 3 - Cross Site Request Forgery (CSRF) Part 4 - File upload vulnerabilities Part 5 - Web application scanners and interceptors These are all the concepts tested in level 2. In level 3, concepts related to the application security will be introduced. Participants will be tested in various concepts of application security. 5.3 Level 3 Part 1 - Binary exploitation Part 2 - Buffer overflow Part 3 - Heap overflow Part 4 - Format string attacks Part 5 - Return oriented programming concepts (ROP) These are all the concepts tested in level 3. In level 4, concepts related to the Forensics and reverse engineering will be introduced and the participants will be tested in the various concepts of this topic. 5.4 Level 4 Part 1 - File system forensics Part 2 - Memory forensics Part 3 - Network forensics Part 4 - Android forensics Part 5 - Botnet detection and rootkit These are all the concepts tested in level 4. Indian Journal of Science and Technology 647
7 Learning Cyber Security Through Gamification Figure 5. List of solved and unsolved problems. 648 Indian Journal of Science and Technology
8 K. Boopathi, S. Sreejith and A. Bithin 6. Conclusion Learning for fun is an effective approach for Cyber security education. It will take students great forward in training more students in computer security. This approach keeps the students motivated and Jeopardy round will be able deliver more learning outcome. 7. References 1. Defacement Statistics of Computer Emergency Response Team India (CERT-In); 2014 Jan-Oct. Available from: 2. Kumar CRS. A review of cyber security curriculum in indian context. Department of Computer Engineering, Defence Institute of Advanced Technology, Girinagar, Pune; Sep. 3. National Cyber Security Policy; 2013 p. 4. Available from: 4. List of CTFs Time. Available from: 5. Joshi A, Ramani V, Murali H, Krishnan R, Mithra Z, Pavithran V. Student centric design for cyber security knowledge empowerment. Amrita Centre for Cyber security; 2012 Jan. 6. Vigna G, Borgolte K, Corbetta J, Doupe A, Fratantonio Y, Invernizzi L, Kirat D, Shoshitaishvili Y. Ten Years of ictf: The Good, The Bad, and The Ugly. Barbara: University of California in Santa; 2014 Aug. 7. Chapman P, Burket J, Brumley D. PicoCTF: a game-based computer security competition for high school students. Carnegie Mellon University; 2014 Aug. 8. rwthctf. Available from: 9. Kannan M, Geetha M, Sujatha J. An analysis between traditional and motion detection game using ICT techniques. Indian Journal of Science and Technology Dec; 7(12): Indian Journal of Science and Technology 649
Scalable and Lightweight CTF Infrastructures Using Application Containers
Scalable and Lightweight CTF Infrastructures Using Application Containers Arvind S Raj, Bithin Alangot, Seshagiri Prabhu and Krishnashree Achuthan Amrita Center for Cybersecurity Systems and Networks Amrita
More informationImplementation and Trial Practices for Hacking Competition CTF as Introductory Educational Experience for Information Literacy and Security Learning
Implementation and Trial Practices for Hacking Competition CTF as Introductory Educational Experience for Information Literacy and Security Learning Makoto Nakaya, Takayuki Abe and Hiroyuki Tominaga Kagawa
More informationUAE National Cyber Security CTF
UAE National Cyber Security CTF April 27, 2017 1776 Space, Emirates Towers, Dubai, UAE Over $7,000 USD in cash prizes! Organizers Prize Sponsors Venue Partners Media Partners ROAD SHOW CTF Capture the
More informationConcept Connect. ECE1778: Final Report. Apper: Hyunmin Cheong. Programmers: GuanLong Li Sina Rasouli. Due Date: April 12 th 2013
Concept Connect ECE1778: Final Report Apper: Hyunmin Cheong Programmers: GuanLong Li Sina Rasouli Due Date: April 12 th 2013 Word count: Main Report (not including Figures/captions): 1984 Apper Context:
More informationUtilizing Capture-The-Flag (CTF) Competitions In The Classroom
Utilizing Capture-The-Flag (CTF) Competitions In The Classroom Dakota State University Assistant Professor Cyber Operations VDA Labs IR / AppSec / MA / (Red/Purple/Blue) Team Bromium MA IA ANG: Cyber Protection
More informationToward a Field Study on the Impact of Hacking Competitions on Secure Development
Toward a Field Study on the Impact of Hacking Competitions on Secure Development Daniel Votipka, Hongyi Hu, Bryan Eastes, and Michelle L. Mazurek 12 Aug 2018 SECURE DEVELOPMENT!2 SECURE DEVELOPMENT!2 SECURE
More informationThis year, the first USENIX Summit on Gaming, Games, and Gamification
Capturing Capture the Flag Further Discussions MARK GONDREE Mark Gondree is a security researcher with an interest in games for education and outreach. With Zachary Peterson, he released [d0x3d!], a board
More informationFrom Boot-to-Root A Method for Successful Security Training
SESSION ID: HUM-W11 From Boot-to-Root A Method for Successful Security Training Dave Farrow Senior Director, Information Security Barracuda Networks, Inc. The Stakes Ignaz Semmelweis: a familiar story
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationMobile SuDoKu Harvesting App
Mobile SuDoKu Harvesting App Benjamin Zwiener Department of Computer Science Doane University 1014 Boswell Ave, Crete, NE, 68333 benjamin.zwiener@doane.edu Abstract The purpose of this project was to create
More informationEvent Planning & Management: How to Create a Wildly Successful Offline or Online Event Checklist
Event Planning & Management: How to Create a Wildly Successful Offline or Online Event Checklist I have set a specific goal or objective for this event: For myself/my company For my attendees I have identified
More informationTrial code included!
The official guide Trial code included! 1st Edition (Nov. 2018) Ready to become a Pro? We re so happy that you ve decided to join our growing community of professional educators and CoSpaces Edu experts!
More informationA RESEARCH PAPER ON ENDLESS FUN
A RESEARCH PAPER ON ENDLESS FUN Nizamuddin, Shreshth Kumar, Rishab Kumar Department of Information Technology, SRM University, Chennai, Tamil Nadu ABSTRACT The main objective of the thesis is to observe
More informationA Mathematics-inspired Game
GS3 Final Report A Mathematics-inspired Game Group Members Mr. Sirasith Kalpiyapan 5422780700 Advisor: Asst. Dr. Gun Srijuntongsiri School of Information, Computer and Communication Technology, Sirindhorn
More informationSAMPLE. Lesson 1: Introduction to Game Design
1 ICT Gaming Essentials Lesson 1: Introduction to Game Design LESSON SKILLS KEY TERMS After completing this lesson, you will be able to: Describe the role of games in modern society (e.g., education, task
More informationCoding as a Game for Contests. Judith Bishop
Coding as a Game for Contests Judith Bishop Take aways 1. Scale of the data 2. Keeping players engaged 3. Different audiences 4. Analytics 5. Responsibility to players 6. Ask for collaborators Audiences
More informationInternet of Things with Arduino
NWTP-2018 in association with EDC cell IIT Roorkee National Winter Training program on Internet of Things with Arduino Objectives of IoT using Arduino Training Internet of Things,or IOT in short, is the
More informationPreparing Teachers for Global Citizenship Education, July
Preparing Teachers for Global Citizenship Education, 27-29 July 2015 sattiya.langkhapin@intel.com Intel Programs Relevant to Global Citizenship Education Agenda Education Transformation Programs Technology
More informationHAREWOOD JUNIOR SCHOOL KEY SKILLS
HAREWOOD JUNIOR SCHOOL KEY SKILLS Computing Purpose of study A high-quality computing education equips pupils to use computational thinking and creativity to understand and change the world. Computing
More informationHardware Implementation of an Explorer Bot Using XBEE & GSM Technology
Volume 118 No. 20 2018, 4337-4342 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Hardware Implementation of an Explorer Bot Using XBEE & GSM Technology M. V. Sai Srinivas, K. Yeswanth,
More informationIncidents Elie Bursztein and Jean Goubault Larrecq
A Logical Framework for Anticipation of Network Incidents and Jean Goubault Larrecq PhdStudent LSV ENS CACHAN CNRS INRIA DGA Outline Introduction Network Evolution Attack Model Evolution Anticipation game
More informationFUNDRAISING HANDBOOK
How to edit your personal 5K page Step 1: Click on Participant Headquarters Login. Step 2: Log in with your username and password. If you do not remember your username and password, you can click on Forgot
More informationLearning and Using Models of Kicking Motions for Legged Robots
Learning and Using Models of Kicking Motions for Legged Robots Sonia Chernova and Manuela Veloso Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {soniac, mmv}@cs.cmu.edu Abstract
More informationLatest Press Release. 10 hr shift schedule spreadsheet
corp@stantec.com Latest Press Release 10 hr shift schedule spreadsheet S Dec 1, 2009. So, familiarize yourself with Cheat Engine before moving directly into this Bloons hack or not. Check this video tutorial
More informationEnrichment chapter: ICT and computers. Objectives. Enrichment
Enrichment chapter: ICT and computers Objectives By the end of this chapter the student should be able to: List some of the uses of Information and Communications Technology (ICT) Use a computer to perform
More informationCode Hunt Contest Analytics. Judith Bishop, Microsoft Research, Redmond USA and team
Code Hunt Contest Analytics Judith Bishop, Microsoft Research, Redmond USA and team Working for fun Enjoyment adds to long term retention on a task Discovery is a powerful driver, contrasting with direct
More informationGame Programming Algorithms And Techniques: A Platform-Agnostic Approach (Game Design) Ebooks Free
Game Programming Algorithms And Techniques: A Platform-Agnostic Approach (Game Design) Ebooks Free Game Programming Algorithms and Techniques is a detailed overview of many of the important algorithms
More informationSpellodrome Student Console
Spellodrome Student Console A guide to using the Spellodrome learning space Spellodrome is a captivating space which provides learners with all the tools they need to be successful, both in the classroom
More informationDesign and Application of Multi-screen VR Technology in the Course of Art Painting
Design and Application of Multi-screen VR Technology in the Course of Art Painting http://dx.doi.org/10.3991/ijet.v11i09.6126 Chang Pan University of Science and Technology Liaoning, Anshan, China Abstract
More informationWalker Guide 2015 Contains team building steps and fundraiser tips!
Walker Guide 2015 Contains team building steps and fundraiser tips! 9302 North Meridian St. Suite 203 Indianapolis, Indiana 46260 317.225.4400 800.948.8806 www.lupusindiana.org 1 WELCOME TEAM CAPTAINS
More informationA Mathematics-inspired Game
GS3 Project Proposal A Mathematics-inspired Game Group Members Mr. Sirasith Kalpiypan 5422780700 Mr. Tanapol Tangthamvanich 5422770404 Advisor: Asst. Dr. Gun Srijuntongsiri School of Information, Computer
More informationCENTRE OF DIGITAL INNOVATION
CENTRE OF DIGITAL INNOVATION CONTENTS CENTRE OF DIGITAL INNOVATION Telecommunications Regulatory Authority Cnr 46th Street & Al Waheeda Street Al Mamzar, Dubai, United Arab Emirates Tel: +971 4 220 8888
More informationST. PATRICK S COLLEGE - SILVERSTREAM DESIGN & VISUAL COMMUNICATIONS COURSE HANDBOOK
ST. PATRICK S COLLEGE - SILVERSTREAM Year 10-2017 DESIGN & VISUAL COMMUNICATIONS COURSE HANDBOOK This guide is provided to inform both parents and students alike on the nature and expectations of the course.
More informationCEO Intern Project Bank
CEO Intern Project Bank Below are some intern project outlines that can be used in a variety of office settings. Feel free to use and/or modify these projects as you see fit. If you have any suggested
More informationPresident: Logan Gore
President: Logan Gore What is ACM? A collection of groups focused on fields in computing Game Development Artificial Intelligence High Performance Computing Etc Host Special Events Company Tech Talks Help
More informationAGENTLESS ARCHITECTURE
ansible.com +1 919.667.9958 WHITEPAPER THE BENEFITS OF AGENTLESS ARCHITECTURE A management tool should not impose additional demands on one s environment in fact, one should have to think about it as little
More informationContact info.
Game Design Bio Contact info www.mindbytes.co learn@mindbytes.co 856 840 9299 https://goo.gl/forms/zmnvkkqliodw4xmt1 Introduction } What is Game Design? } Rules to elaborate rules and mechanics to facilitate
More informationData Hiding Using LSB with QR Code Data Pattern Image
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Data Hiding Using LSB with QR Code Data Pattern Image D. Antony Praveen Kumar M.
More informationLearning and Using Models of Kicking Motions for Legged Robots
Learning and Using Models of Kicking Motions for Legged Robots Sonia Chernova and Manuela Veloso Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 {soniac, mmv}@cs.cmu.edu Abstract
More informationYour Shortcut to Start your Online Business And Make Profit in 30 Days
THE MYTEACHERPRENEURS eguide Your Shortcut to Start your Online Business And Make Profit in 30 Days CONGRATULATIONS for getting this far and I m grateful that you have purchased The challenge of Change
More informationFacebook Fan Page Secrets... 3 Section 1 Social Media Optimization... 4 Set Up Your Facebook Page... 4 Section 2 Fan Page Customization...
Facebook Fan Page Secrets... 3 Section 1 Social Media Optimization... 4 Set Up Your Facebook Page... 4 Section 2 Fan Page Customization... 6 Legitimize Your URL... 6 Customize the Look of Your Page...
More informationProgram.
Program Introduction S TE AM www.kiditech.org About Kiditech In Kiditech's mighty world, we coach, play and celebrate an innovative technology program: K-12 STEAM. We gather at Kiditech to learn and have
More informationHow To Make Money With CPALead
By (melek.taus@yahoo.com) This free ebook has been downloaded from: http://easy-cpalead-money.blogspot.com/p/download.html If you already registered to CPALead please take the time to complete a two minutes
More informationVirtual Reality Game using Oculus Rift
CN1 Final Report Virtual Reality Game using Oculus Rift Group Members Chatpol Akkawattanakul (5422792135) Photpinit Kalayanuwatchai (5422770669) Advisor: Dr. Cholwich Nattee Dr. Nirattaya Khamsemanan School
More informationBuzztime Tablet Guide
Buzztime Tablet Guide Index of Content Introduction to Buzztime...3 Buzztime Basics: Key Concepts for Success... 6 Buzztime Tablets... 8 PlayersPlus Membership and Registration for Your Guests... 14 General
More informationDUBAI TECH & DIGITAL WINTER CAMP
Is your child ready for the digital future? DUBAI TECH & DIGITAL WINTER CAMP LOCATION The winter camps are offered in partnership with Swiss International Scientific Dubai (SiSD) school, a leading IB school
More informationAuthor Tutorial for OPTE Editorial Manager System
CONTENTS Registration/Login/Password... 2 Edit Account Information... 5 Track Manuscript Status... 15 Submit Revised Manuscript... 16 View Manuscript Decision... 21 Registration/Login/Password In order
More informationIntroducing Nuclear Security Topics Through Synergizing Several Existing Courses in Nuclear Engineering Curriculum of Universitas Gadjah Mada
Institute of Nuclear Material Management th Annual Meeting July 2-24, 214 Introducing Nuclear Security Topics Through Synergizing Several Existing Courses in Nuclear Engineering Curriculum of Universitas
More information33 rd Indian Engineering Congress
The Institution of Engineers (India) In service of the Nation since 1920 33 rd Indian Engineering Congress December 21-23, 2018, Udaipur Hosted by: Udaipur Local Centre Venue : Udaipur Theme Integration
More informationTHE USE OF LEGO MINDSTORMS NXT ROBOTS IN THE TEACHING OF INTRODUCTORY JAVA PROGRAMMING TO UNDERGRADUATE STUDENTS
THE USE OF LEGO MINDSTORMS NXT ROBOTS IN THE TEACHING OF INTRODUCTORY JAVA PROGRAMMING TO UNDERGRADUATE STUDENTS Elizabeth A. Gandy: University of Sunderland Department of Computing, Engineering & Technology,
More informationA Hybrid Risk Management Process for Interconnected Infrastructures
A Hybrid Management Process for Interconnected Infrastructures Stefan Schauer Workshop on Novel Approaches in and Security Management for Critical Infrastructures Vienna, 19.09.2017 Contents Motivation
More informationKeywords: Educational system, Administrator of production, Product Lifecycle management, Production management, KAIZEN activity
Design of Educational Program for Management of Market, Procurement, and Production Case Study of Educational Program for Factory Management in University Masahiro Arakawa Graduate School of Engineering,
More informationIndiana K-12 Computer Science Standards
Indiana K-12 Computer Science Standards What is Computer Science? Computer science is the study of computers and algorithmic processes, including their principles, their hardware and software designs,
More informationFindings of a User Study of Automatically Generated Personas
Findings of a User Study of Automatically Generated Personas Joni Salminen Qatar Computing Research Institute, Hamad Bin Khalifa University and Turku School of Economics jsalminen@hbku.edu.qa Soon-Gyo
More informationsettinga.html & setcookiesa.php
Lab4 Deadline: 18 Oct 2017 Information about php: Variable $_SERVER[ PHP_SELF ] Description The filename of the current script (relative to the root directory) Function string htmlspecialchars(string $s)
More informationPresented by Anelisa Mente
Rhodes University Library: a shift from you re not allowed to use Facebook in the library to please like and follow our page Presented by Anelisa Mente 14 October 2016 LIASA 17th Annual Conference, Durban
More information1 Document history Version Date Comments
V1.4 Contents 1 Document history... 2 2 What is TourneyKeeper?... 3 3 Creating your username and password... 4 4 Creating a tournament... 5 5 Editing a tournament... 8 6 Adding players to a tournament...
More informationST. PATRICK S COLLEGE - SILVERSTREAM DESIGN & VISUAL COMMUNICATIONS COURSE HANDBOOK
ST. PATRICK S COLLEGE - SILVERSTREAM Year 10-2015 DESIGN & VISUAL COMMUNICATIONS COURSE HANDBOOK This guide is provided to inform both parents and students alike on the nature and expectations of the course.
More informationSerial No.: MTYxOTAwMDAxMzAw
MODEL: SODIS-215 SERIES NAME: HOOP SHOT CYBER ARCADE Serial No.: MTYxOTAwMDAxMzAw NOTICE! - Actual product may vary in color and design - Above Serial No. is for registering Hoop Shot Online Game on your
More informationOnline Game Technology for Space Education and System Analysis
Online Game Technology for Space Education and System Analysis PREPARED BY DATE REVISION MindArk PE AB 2010-03-15 3 1 21 Executive summary Playing video games is a common activity for the youth of today
More informationCross Linking Research and Education and Entrepreneurship
Cross Linking Research and Education and Entrepreneurship MATLAB ACADEMIC CONFERENCE 2016 Ken Dunstan Education Manager, Asia Pacific MathWorks @techcomputing 1 Innovation A pressing challenge Exceptional
More informationMicroservices Writing a script
Intro Good afternoon! My name is Dinah Handel and I m going to be talking a little bit about using technology- specifically tools like bash, the command line, ffmpeg, and mediainfo, to build simple scripts
More informationAuthor Instructions FPIN Editorial Manager
Author Instructions FPIN Editorial Manager Login Information: www.editorialmanager.com/fpin Your username and password will have been sent to you by the FPIN Project Manager. If you do not have it, please
More informationwhat if? You could earn scholarship money for college every time you got a good grade in high school?
what if? 3 of23 You could earn scholarship money for college every time you got a good grade in high school? You could also earn money for playing sports, participating in school clubs, being a leader,
More informationOfficial Rules & Regulations Games Competition 2015 Season
Official Rules & Regulations Games Competition 2015 Season Version 1.0 September 10 2014 OVERVIEW The Imagine Cup Games Competition honors the most fun, innovative, and creative games built with Microsoft
More informationIntroduction: So now, what exactly is blogging and why do you want to get into it. Potential of Blogging:
HOW TO BUILD A WORDP RESS BLOG- STEP BY STEP GUIDE FOR BE GINNERS By Introduction: WordPress is ablogging platform which doesn t need much introduction in this digital world. This is the most common and
More informationRUNNYMEDE COLLEGE & TECHTALENTS
RUNNYMEDE COLLEGE & TECHTALENTS Why teach Scratch? The first programming language as a tool for writing programs. The MIT Media Lab's amazing software for learning to program, Scratch is a visual, drag
More informationCompetition Rules
Competition Rules 2018-2019 GETTING STARTED The Tournament will consist of Team and Solo Events. Teams of eight (8) will be competing for the fastest time to collectively solve 25 Rubik's Cubes. Solo competitors
More informationStoa Administrative Calendar
January o Select next year's NITOC TD to shadow this year's TD at NITOC (or earlier -Ideally this would happen ahead of time, so that the process would begin whenever the current TD begins working on the
More informationTo be published by IGI Global: For release in the Advances in Computational Intelligence and Robotics (ACIR) Book Series
CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: September 15, 2014 Emerging Technologies in Intelligent Applications for Image and Video Processing A book edited by Dr. V. Santhi (VIT University,
More informationAnsible Tower Quick Setup Guide
Ansible Tower Quick Setup Guide Release Ansible Tower 3.2.2 Red Hat, Inc. Mar 08, 2018 CONTENTS 1 Quick Start 2 2 Login as a Superuser 3 3 Import a License 5 4 Examine the Tower Dashboard 7 5 The Settings
More informationMOBILE DATA INTEROPERABILITY ALGORITHM USING CHESS GAMIFICATION
MOBILE DATA INTEROPERABILITY ALGORITHM USING CHESS GAMIFICATION Shital Bhabad 1 1 Master of Engineering Student, Department of Computer Engineering, Pune Institute of Computer Technology, 411043, Savitribai
More informationWELCOME TEAM CAPTAINS!
WELCOME TEAM CAPTAINS! Thank you for your leadership in joining the Run or Walk for Southlake, presented by Nature s Emporium, as a Team Captain! This kit is designed to provide you with the tools you
More informationLeague of Legends: Dynamic Team Builder
League of Legends: Dynamic Team Builder Blake Reed Overview The project that I will be working on is a League of Legends companion application which provides a user data about different aspects of the
More informationA Design of Infographics by using MVC Design Patterns Based on N-Tier Platform
Indian Journal of Science and Technology, Vol 8(S7), 618-623, April 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS7/70449 A Design of Infographics by using MVC Design
More informationTHE FUTURE OF STORYTELLINGº
THE FUTURE OF STORYTELLINGº PHASE 2 OF 2 THE FUTURE OF STORYTELLING: PHASE 2 is one installment of Latitude 42s, an ongoing series of innovation studies which Latitude, an international research consultancy,
More information2.6.1: Program Outcomes
2.6.1: Program Outcomes Program: M.Sc. Informatics Program Specific Outcomes (PSO) PSO1 This program provides studies in the field of informatics, which is essentially a blend of three domains: networking,
More informationChapter 5: Game Analytics
Lecture Notes for Managing and Mining Multiplayer Online Games Summer Semester 2017 Chapter 5: Game Analytics Lecture Notes 2012 Matthias Schubert http://www.dbs.ifi.lmu.de/cms/vo_managing_massive_multiplayer_online_games
More informationBotzone: A Game Playing System for Artificial Intelligence Education
Botzone: A Game Playing System for Artificial Intelligence Education Haifeng Zhang, Ge Gao, Wenxin Li, Cheng Zhong, Wenyuan Yu and Cheng Wang Department of Computer Science, Peking University, Beijing,
More informationIndustrial Engineering Prof. D. K. Dwivedi Department of Mechanical and Industrial Engineering Indian Institute of Technology, Roorkee
Industrial Engineering Prof. D. K. Dwivedi Department of Mechanical and Industrial Engineering Indian Institute of Technology, Roorkee Module - 3 Lecture - 5 Recording Techniques for Method Study Part
More information2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge
2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge This competition is sponsored by the IEEE Signal Processing Society Introduction The IEEE Signal Processing Society s 2018
More informationDuplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.
Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following
More informationRunning head: THE IMPACT OF COMPUTER ENGINEERING 1
Running head: THE IMPACT OF COMPUTER ENGINEERING 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 THE IMPACT OF COMPUTER ENGINEERING 2 Abstract The purpose of this paper
More informationScience, Technology, Engineering and Mathematics (STEM) Update. Education Development Committee Meeting March 10, 2015
Science, Technology, Engineering and Mathematics (STEM) Update Education Development Committee Meeting March 10, 2015 What is STEM? https://www.youtube.com/watch?v=alpj48simte What is STEM? PA Definition
More informationIf you believe that your ideas are important enough to publish on the World
Chapter 1 What WordPress Can Do for You In This Chapter Understanding the benefits of WordPress Getting acquainted with the basic features of WordPress If you believe that your ideas are important enough
More informationEvaluation of Competing Threat Modeling Methodologies
Evaluation of Competing Threat Modeling Methodologies Dr. Forrest Shull Team: Nancy Mead, Kelwyn Pender, & Sam Weber (SEI) Jane Cleland-Huang, Janine Spears, & Stefan Hiebl (DePaul) Tadayoshi Kohno (University
More informationSTEM Resources. Activities/Competitions (Please check the closing dates) Beat the Flood
STEM Resources Activities/Competitions (Please check the closing dates) Competition / KS1 KS2 KS3 KS4 KS5 In-school Ambassador support Further details Into Film: Into Space British Science Week Packs (from
More informationPaid Surveys Secret. The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report. Published by Surveys & Friends
Paid Surveys Secret The Most Guarded Secret Top Survey Takers Cash In and Will Never Tell You! Top Secret Report Published by Surveys & Friends http://www.surveysandfriends.com All Rights Reserved This
More information2016 Geothermal Student Competition: Advancing Awareness of Geothermal Technologies Through Educational Challenges
GRC Transactions, Vol. 41, 2017 2016 Geothermal Student Competition: Advancing Awareness of Geothermal Technologies Through Educational Challenges Phyllis L. King and Tammie Borders Idaho National Laboratory
More informationSolving tasks and move score... 18
Solving tasks and move score... 18 Contents Contents... 1 Introduction... 3 Welcome to Peshk@!... 3 System requirements... 3 Software installation... 4 Technical support service... 4 User interface...
More informationIntroduction to Buzztime and BEOND.. Page 3. Buzztime Basics: Key Concepts for Success. Page 6. Tablet Playmakers.. Page 9
Tablet Guide Index of Content Introduction to Buzztime and BEOND.. Page 3 Buzztime Basics: Key Concepts for Success. Page 6 Tablet Playmakers.. Page 9 PlayersPlus Membership and Registration for Your Guests..
More informationXdigit: An Arithmetic Kinect Game to Enhance Math Learning Experiences
Xdigit: An Arithmetic Kinect Game to Enhance Math Learning Experiences Elwin Lee, Xiyuan Liu, Xun Zhang Entertainment Technology Center Carnegie Mellon University Pittsburgh, PA 15219 {elwinl, xiyuanl,
More informationExpand Your Reach with Podcasting
Expand Your Reach with Podcasting Dispel the Myths and Discover the Truth Bonnie Groessl Holistic Entrepreneur, International Podcast Host, Author, Success Coach 1 ALL RIGHTS RESERVED. No part of this
More informationCMRE La Spezia, Italy
Innovative Interoperable M&S within Extended Maritime Domain for Critical Infrastructure Protection and C-IED CMRE La Spezia, Italy Agostino G. Bruzzone 1,2, Alberto Tremori 1 1 NATO STO CMRE& 2 Genoa
More informationThe Podcast Cheat Sheet
The Podcast Cheat Sheet by Pat Flynn Contents Introduction... 2 You and Your Future Podcast... 4 Planning Your Podcast Episodes...6 Recording and Editing Your Show... 7 Preparing the Audio File for the
More informationHierarchical Controller for Robotic Soccer
Hierarchical Controller for Robotic Soccer Byron Knoll Cognitive Systems 402 April 13, 2008 ABSTRACT RoboCup is an initiative aimed at advancing Artificial Intelligence (AI) and robotics research. This
More informationVasantrao Naik Marathwada Krishi Vidyapeeth University Library, Parbhani No. U.L. /CIS/671/18 Date: 03 September 2018
Vasantrao Naik Marathwada Krishi Vidyapeeth University Library, Parbhani No. U.L. /CIS/671/18 Date: 03 September 2018 NOTIFICATION Sub: Call for quotation: Digitization and digital archiving of old theses
More informationFaculty Profile. Dr. T. R. VIJAYA LAKSHMI JNTUH Faculty ID: Date of Birth: Designation:
Faculty Profile Dr. T. R. VIJAYA LAKSHMI JNTUH Faculty ID: 25150330-153821 Date of Birth: 08-12-1979 Designation: Asst. Professor Teaching Experience: 15 years E-mail ID: vijaya.chintala@mgit.ac.in AREAS
More informationBodyKey App 2.0 User Guide (AMWAY -Organised and Self-Organised Challenge)
BodyKey App 2.0 User Guide (AMWAY -Organised and Self-Organised Challenge) What s in this guide Getting Started 3 Introduction to BodyKey Challenge BodyKey Reward System Challenge Ranking Board AMWAY -Organised
More information- Introduction - Minecraft Pi Edition. - Introduction - What you will need. - Introduction - Running Minecraft
1 CrowPi with MineCraft Pi Edition - Introduction - Minecraft Pi Edition - Introduction - What you will need - Introduction - Running Minecraft - Introduction - Playing Multiplayer with more CrowPi s -
More information